{"id":60043,"date":"2026-01-22T05:14:14","date_gmt":"2026-01-22T05:14:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=144888"},"modified":"2026-01-22T05:14:14","modified_gmt":"2026-01-22T05:14:14","slug":"resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/","title":{"rendered":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Microsoft Defender Researchers uncovered a multi\u2011stage adversary\u2011in\u2011the\u2011middle (AiTM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector, resulting in the compromise of various user accounts. The campaign abused SharePoint file\u2011sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness. The attack transitioned into a series of AiTM attacks and follow-on BEC activity spanning multiple organizations.<\/p>\n<p class=\"wp-block-paragraph\">Following the initial compromise, the attackers leveraged trusted internal&nbsp;identities from the target to conduct large\u2011scale intra\u2011organizational and external phishing, significantly expanding the scope of the campaign. Defender detections surfaced the activity to all affected organizations.<\/p>\n<p class=\"wp-block-paragraph\">This attack demonstrates the operational complexity of AiTM campaigns and the need for remediation beyond standard identity compromise responses. Password resets alone are insufficient. Impacted organizations in the energy sector must additionally revoke active session cookies and remove attacker-created inbox rules used to evade detection.<\/p>\n<h2 class=\"wp-block-heading\" id=\"attack-chain-aitm-phishing-attack\"><strong>Attack chain: AiTM phishing attack<\/strong><\/h2>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"521\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-1.jpg\" alt class=\"wp-image-144892\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-1.jpg 926w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-1-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-1-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-1-809x455.jpg 809w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\"><\/figure>\n<p class=\"wp-block-paragraph\"><strong>Stage 1: Initial access via trusted vendor compromise<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Analysis of the initial access vector indicates that the campaign leveraged a phishing email sent from an email address belonging to a trusted organization, likely compromised before the operation began. The lure employed a SharePoint URL requiring user authentication and used subject\u2011line mimicry consistent with legitimate SharePoint document\u2011sharing workflows to increase credibility.<\/p>\n<p class=\"wp-block-paragraph\">Threat actors continue to leverage trusted cloud collaboration platforms particularly Microsoft SharePoint and OneDrive due to their ubiquity in enterprise environments. These services offer built\u2011in legitimacy, flexible file\u2011hosting capabilities, and authentication flows that adversaries can repurpose to obscure malicious intent. This widespread familiarity enables attackers to deliver phishing links and hosted payloads that frequently evade traditional email\u2011centric detection mechanisms.<\/p>\n<p class=\"wp-block-paragraph\"><strong>Stage 2: Malicious URL clicks<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Threat actors often abuse legitimate services and brands to avoid detection. In this scenario, we observed that the attacker leveraged the SharePoint service for the phishing campaign. While threat actors may attempt to abuse widely trusted platforms, Microsoft continuously invests in safeguards, detections, and abuse prevention to limit misuse of our services and to rapidly detect and disrupt malicious activity<\/p>\n<p class=\"wp-block-paragraph\"><strong>Stage 3: AiTM attack<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Access to the URL redirected users to a credential prompt, but visibility into the attack flow did not extend beyond the landing page.<\/p>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-20.webp\" alt class=\"wp-image-144893 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/01\/image-20.webp\"><\/figure>\n<p class=\"wp-block-paragraph\"><strong>Stage 4: Inbox rule creation<\/strong><\/p>\n<p class=\"wp-block-paragraph\">The attacker later signed in with another IP address and created an Inbox rule with parameters to delete all incoming emails on the user\u2019s mailbox and marked all the emails as read.<\/p>\n<p class=\"wp-block-paragraph\"><strong>Stage 5: Phishing campaign<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Followed by Inbox rule creation, the attacker initiated a large-scale phishing campaign involving more than 600 emails with another phishing URL. The emails were sent to the compromised user\u2019s contacts, both within and outside of the organization, as well as distribution lists. The recipients were identified based on the recent email threads in the compromised user\u2019s inbox.<\/p>\n<p class=\"wp-block-paragraph\"><strong>Stage 6: BEC tactics<\/strong><\/p>\n<p class=\"wp-block-paragraph\">The attacker then monitored the victim user\u2019s mailbox for undelivered and out of office emails and deleted them from the Archive folder. The attacker read the emails from the recipients who raised questions regarding the authenticity of the phishing email and responded, possibly to falsely confirm that the email is legitimate. The emails and responses were then deleted from the mailbox. These techniques are common in any BEC attacks and are intended to keep the victim unaware of the attacker\u2019s operations, thus helping in persistence.<\/p>\n<p class=\"wp-block-paragraph\"><strong>Stage 7: Accounts compromise<\/strong><\/p>\n<p class=\"wp-block-paragraph\">The recipients of the phishing emails from within the organization who clicked on the malicious URL were also targeted by another AiTM attack. Microsoft Defender Experts identified all compromised users based on the landing IP and the sign-in IP patterns.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"mitigation-and-protection-guidance\">Mitigation and protection guidance<\/h2>\n<p class=\"wp-block-paragraph\">Microsoft Defender XDR detects suspicious activities related to AiTM phishing attacks and their follow-on activities, such as sign-in attempts on multiple accounts and creation of malicious rules on compromised accounts. To further protect themselves from similar attacks, organizations should also consider complementing MFA with conditional access policies, where sign-in requests are evaluated using additional identity-driven signals like user or group membership, IP location information, and device status, among others.<\/p>\n<p class=\"wp-block-paragraph\">Defender Experts also initiated rapid response with Microsoft Defender XDR to contain the attack including:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-defender-blog\/automatically-disrupt-adversary-in-the-middle-aitm-attacks-with\/ba-p\/3821751\">Automatically disrupting<\/a> the AiTM attack on behalf of the impacted users based on the signals observed in the campaign.<\/li>\n<li class=\"wp-block-list-item\">Initiating <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/office-365-security\/zero-hour-auto-purge\">zero-hour auto purge (ZAP)<\/a> in Microsoft Defender XDR to find and take automated actions on the emails that are a part of the phishing campaign.<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">Defender Experts further worked with customers to remediate compromised identities through the following recommendations:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/enterprise-users\/users-revoke-access\">Revoking session cookies<\/a> in addition to resetting passwords.<\/li>\n<li class=\"wp-block-list-item\">Revoking the MFA setting changes made by the attacker on the compromised user\u2019s accounts.<\/li>\n<li class=\"wp-block-list-item\">Deleting suspicious rules created on the compromised accounts.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"mitigating-aitm-phishing-attacks\"><strong>Mitigating AiTM phishing attacks<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">The general remediation measure for any identity compromise is to reset the password for the compromised user. However, in AiTM attacks, since the sign-in session is compromised, password reset is not an effective solution. Additionally, even if the compromised user\u2019s password is reset and sessions are revoked, the attacker can set up persistence methods to sign-in in a controlled manner by tampering with MFA. For instance, the attacker can add a new MFA policy to sign in with a one-time password (OTP) sent to attacker\u2019s registered mobile number. With these persistence mechanisms in place, the attacker can have control over the victim\u2019s account despite conventional remediation measures.<\/p>\n<p class=\"wp-block-paragraph\">While AiTM phishing attempts to circumvent MFA, implementation of MFA still remains an essential pillar in identity security and highly effective at stopping a wide variety of threats. MFA is the reason that threat actors developed the AiTM session cookie theft technique in the first place. Organizations are advised to work with their identity provider to ensure security controls like MFA are in place. Microsoft customers can implement MFA through various methods, such as using the Microsoft Authenticator, FIDO2 security keys, and certificate-based authentication.<\/p>\n<p class=\"wp-block-paragraph\">Defenders can also complement MFA with the following solutions and best practices to further protect their organizations from such attacks:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Use <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\"><strong>security defaults<\/strong><\/a> as a baseline set of policies to improve identity security posture. For more granular control, <strong>enable conditional access policies, especially risk-based access policies. <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/overview?ocid=magicti_ta_learndoc\">Conditional access<\/a> policies evaluate sign-in requests using additional identity-driven signals like user or group membership, IP location information, and device status, among others, and are enforced for suspicious sign-ins. Organizations can protect themselves from attacks that leverage stolen credentials by enabling policies such as compliant devices, trusted IP address requirements, or risk-based policies with proper access control.<\/li>\n<li class=\"wp-block-list-item\"><strong>Implement <\/strong><a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/concept-continuous-access-evaluation?ocid=magicti_ta_learndoc\"><strong>continuous access evaluation<\/strong><\/a><strong>.<\/strong><\/li>\n<li class=\"wp-block-list-item\"><strong>Invest in advanced anti-phishing solutions <\/strong>that monitor and scan incoming emails and visited websites. For example, organizations can leverage web browsers that automatically <a href=\"https:\/\/learn.microsoft.com\/deployedge\/microsoft-edge-security-smartscreen?ocid=magicti_ta_learndoc\">identify and block malicious websites<\/a>, including those used in this phishing campaign, and solutions that <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-office-365\">detect and block malicious emails, links, and files<\/a>.<\/li>\n<li class=\"wp-block-list-item\"><strong>Continuously monitor suspicious or anomalous activities. <\/strong>Hunt for sign-in attempts with suspicious characteristics (for example, location, ISP, user agent, and use of anonymizer services).<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"detections\"><strong>Detections<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Because AiTM phishing attacks are complex threats, they require solutions that leverage signals from multiple sources. <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft Defender XDR<\/a>&nbsp;uses its cross-domain visibility to detect malicious activities related to AiTM, such as session cookie theft and attempts to use stolen cookies for signing in.<\/p>\n<p class=\"wp-block-paragraph\">Using Microsoft Defender for Cloud Apps <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/enable-instant-visibility-protection-and-governance-actions-for-your-apps\">connectors<\/a>, Microsoft Defender XDR raises AiTM-related alerts in multiple scenarios. For Microsoft Entra ID customers using Microsoft Edge, attempts by attackers to replay session cookies to access cloud applications are detected by Defender for Cloud Apps connectors for <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-office-365\">Microsoft 365<\/a> and <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-azure\">Azure<\/a>. In such scenarios, Microsoft Defender XDR&nbsp;raises the following alert:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Stolen session cookie was used<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">In addition, signals from these Defender for Cloud Apps connectors, combined with data from the Defender for Endpoint network protection capabilities, also triggers the following Microsoft Defender XDR alert on Microsoft Entra ID. environments:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Possible AiTM phishing attempt<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">A specific Defender for Cloud Apps <a href=\"https:\/\/learn.microsoft.com\/defender-cloud-apps\/connect-okta\">connector for Okta<\/a>, together with Defender for Endpoint, also helps detect AiTM attacks on Okta accounts using the following alert:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Possible AiTM phishing attempt in Okta<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">Other detections that show potentially related activity are the following:<\/p>\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender for Office 365<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Email messages containing malicious file removed after delivery<\/li>\n<li class=\"wp-block-list-item\">Email messages from a campaign removed after delivery<\/li>\n<li class=\"wp-block-list-item\">A potentially malicious URL click was detected<\/li>\n<li class=\"wp-block-list-item\">A user clicked through to a potentially malicious URL<\/li>\n<li class=\"wp-block-list-item\">Suspicious email sending patterns detected<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender for Cloud Apps<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Suspicious inbox manipulation rule<\/li>\n<li class=\"wp-block-list-item\">Impossible travel activity<\/li>\n<li class=\"wp-block-list-item\">Activity from infrequent country<\/li>\n<li class=\"wp-block-list-item\">Suspicious email deletion activity<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\"><strong>Microsoft Entra ID Protection<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Anomalous Token<\/li>\n<li class=\"wp-block-list-item\">Unfamiliar sign-in properties<\/li>\n<li class=\"wp-block-list-item\">Unfamiliar sign-in properties for session cookies<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\"><strong>Microsoft Defender XDR<\/strong><strong><\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">BEC-related credential harvesting attack<\/li>\n<li class=\"wp-block-list-item\">Suspicious phishing emails sent by BEC-related user<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\"><strong>Indicators of Compromise<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Network Indicators\n<ul>\n<li>178.130.46.8 \u2013 Attacker infrastructure<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">193.36.221.10 \u2013 Attacker infrastructure<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"recommended-actions\"><strong>Recommended actions<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Microsoft recommends the following mitigations to reduce the impact of this threat:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Enable <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/overview\">Conditional Access policies<\/a> in Microsoft Entra, especially risk-based access policies. Conditional access policies evaluate sign-in requests using additional identity-driven signals like user or group membership, IP address location information, and device status, among others, are enforced for suspicious sign-ins. Organizations can protect themselves from attacks that leverage stolen credentials by enabling policies such as compliant devices, Azure trusted IP address requirements, or risk-based policies with proper access control. If you are still evaluating Conditional Access, use <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\">security defaults<\/a> as an initial baseline set of policies to improve identity security posture.<\/li>\n<li class=\"wp-block-list-item\">Implement <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/concept-continuous-access-evaluation\">continuous access evaluation<\/a>.<\/li>\n<li class=\"wp-block-list-item\">Implement <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/concept-authentication-passwordless#fido2-security-keys\">Microsoft Entra passwordless sign-in with FIDO2 security keys<\/a>.<\/li>\n<li class=\"wp-block-list-item\">Turn on <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/enable-network-protection\">network protection<\/a> in Microsoft Defender for Endpoint to block connections to malicious domains and IP addresses.<\/li>\n<li class=\"wp-block-list-item\">Implement <a href=\"https:\/\/learn.microsoft.com\/defender-endpoint\/mtd\">Microsoft Defender for Endpoint \u2013 Mobile Threat Defense<\/a> on mobile devices used to access enterprise assets.<\/li>\n<li class=\"wp-block-list-item\">Leverage Microsoft Edge automatically <a href=\"https:\/\/learn.microsoft.com\/deployedge\/microsoft-edge-security-smartscreen\">identify and block malicious websites<\/a>, including those used in this phishing campaign, and <a href=\"https:\/\/learn.microsoft.com\/defender-office-365\/tenant-allow-block-list-about\">Microsoft Defender for Office 365<\/a> to detect and block malicious emails, links, and files. <a href=\"https:\/\/learn.microsoft.com\/entra\/id-protection\/howto-identity-protection-configure-notifications\">Monitor suspicious or anomalous activities<\/a> in Microsoft Entra ID Protection. Investigate sign-in attempts with suspicious characteristics (such as the location, ISP, user agent, and use of anonymizer services). Educate users about the risks of secure file sharing and emails from trusted vendors.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"hunting-queries\"><strong>Hunting queries<\/strong> \u2013 <strong>Microsoft XDR<\/strong><\/h2>\n<p class=\"wp-block-paragraph\"><strong>AHQ#1 \u2013 Phishing Campaign:<\/strong><\/p>\n<p class=\"wp-block-paragraph\">EmailEvents<\/p>\n<p class=\"wp-block-paragraph\">| where Subject has \u201c<em>NEW PROPOSAL \u2013 NDA\u201d<\/em><\/p>\n<p class=\"wp-block-paragraph\"><strong>AHQ#2 \u2013 Sign-in activity from the suspicious IP Addresses<\/strong><\/p>\n<p class=\"wp-block-paragraph\">AADSignInEventsBeta<\/p>\n<p class=\"wp-block-paragraph\">| where Timestamp &gt;= ago(7d)<\/p>\n<p class=\"wp-block-paragraph\">| where IPAddress startswith \u201c178.130.46.\u201d or IPAddress startswith \u201c193.36.221.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"microsoft-sentinel\"><strong>Microsoft Sentinel<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Microsoft Sentinel customers can use the following analytic templates to find BEC related activities similar to those described in this post:<\/p>\n<p class=\"wp-block-paragraph\">In addition to the analytic templates listed above, Microsoft Sentinel customers can use the following hunting content to perform Hunts for BEC related activities:<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/01\/21\/multistage-aitm-phishing-bec-campaign-abusing-sharepoint\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Defender Researchers uncovered a multi\u2011stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector.<br \/>\nThe post Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":60044,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-60043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi\u2011stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi\u2011stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-22T05:14:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0\",\"datePublished\":\"2026-01-22T05:14:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/\"},\"wordCount\":1769,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/\",\"name\":\"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg\",\"datePublished\":\"2026-01-22T05:14:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg\",\"width\":926,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi\u2011stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/","og_locale":"en_US","og_type":"article","og_title":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi\u2011stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-01-22T05:14:14+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0","datePublished":"2026-01-22T05:14:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/"},"wordCount":1769,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/01\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/","url":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/","name":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/01\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg","datePublished":"2026-01-22T05:14:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/01\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2026\/01\/resurgence-of-a-multie28091stage-aitm-phishing-and-bec-campaign-abusing-sharepoint.jpg","width":926,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/resurgence-of-a-multi%e2%80%91stage-aitm-phishing-and-bec-campaign-abusing-sharepoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Resurgence of a multi\u2011stage AiTM phishing and BEC campaign abusing SharePoint\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60043"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/60044"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}